Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

ERMAC 3.0: Unleashing a Global Web of Malware, A Threat to Banking, Shopping, and Cryptocurrency Apps




ERMAC 3.0, a sophisticated Android banking trojan, has leaked its source code, revealing significant weaknesses in its infrastructure. The leak exposes vulnerabilities that can be exploited by threat actors, posing a major threat to the security of banking, shopping, and cryptocurrency applications worldwide. Experts warn of the need for individuals and organizations to remain vigilant and take proactive steps to protect themselves from this evolving malware.

  • ERMAC 3.0, a sophisticated Android banking trojan, has been leaked and its full source code has been obtained by researchers at Hunt.io.
  • The leak exposed significant weaknesses in ERMAC 3.0's infrastructure, allowing experts to identify potential vulnerabilities and develop countermeasures.
  • ERMAC 3.0 has expanded its form injection and data theft capabilities, targeting over 700 banking, shopping, and cryptocurrency applications using the Android WebView API.
  • The malware has exploitable weaknesses, including hardcoded secrets, static tokens, and weak credentials, which can be exploited to gain unauthorized access to its C2 servers.
  • Experts recommend implementing secure Android permissions, regularly scanning for active C2 and exfiltration servers, and blocking applications that reference known ERMAC IPs or domains.



  • ERMAC 3.0, a sophisticated Android banking trojan, has been making headlines for its relentless expansion into the global malware landscape. In a recent development that has sent shockwaves through the cybersecurity community, researchers at Hunt.io have successfully obtained the full source code of ERMAC 3.0, revealing the malicious intentions behind this evolving threat.

    The source code leak has exposed significant weaknesses in ERMAC 3.0's infrastructure, allowing experts to identify potential vulnerabilities and develop countermeasures to disrupt its operations. According to a report published by Hunt.io, the leaked source code includes backend (PHP/Laravel C2), frontend (React), Golang exfiltration server, Docker configs, and builder. This comprehensive analysis has provided valuable insights into the inner workings of ERMAC 3.0, shedding light on its modus operandi and tactics.

    ERMAC 3.0's evolution from Cerberus and Hook (ERMAC 2.0) reveals a significant expansion of its form injection and data theft capabilities, targeting over 700 banking, shopping, and cryptocurrency applications. The malware leverages the Android WebView API to place an overlay on top of legitimate apps, capturing credentials and payment information with unprecedented ease.

    The leaked source code has also exposed several exploitable weaknesses in ERMAC 3.0's infrastructure, including hardcoded secrets, static tokens, and weak credentials. Furthermore, researchers have identified a hardcoded JWT (JSON Web Token) that can be exploited to gain unauthorized access to the malware's C2 (command and control) servers.

    The report emphasizes the importance of implementing secure Android permissions, such as FLAG_SECURE, to reduce exposure to this technique. Additionally, experts recommend regularly scanning for active C2 and exfiltration servers, and blocking Android applications that reference known ERMAC IPs or domains.

    Pierluigi Paganini, a renowned cybersecurity expert, comments on the significance of the source code leak: "ERMAC 3.0 targets users of banking, shopping, and other financial applications primarily through web injects. It relies on Android's WebView API to place an overlay on top of legitimate apps, capturing credentials and payment information."

    The implications of this development cannot be overstated. ERMAC 3.0's global reach and evolving capabilities pose a significant threat to the security of banking, shopping, and cryptocurrency applications worldwide. As cybersecurity experts continue to analyze and develop countermeasures against this threat, it is essential for individuals and organizations to remain vigilant and take proactive steps to protect themselves from this evolving malware.

    In conclusion, the source code leak of ERMAC 3.0 has exposed a web of vulnerabilities that can be exploited by threat actors. As cybersecurity experts continue to work tirelessly to develop countermeasures against this threat, it is crucial for individuals and organizations to stay informed and take necessary precautions to protect themselves from the malicious intentions behind ERMAC 3.0.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/ERMAC-30-Unleashing-a-Global-Web-of-Malware-A-Threat-to-Banking-Shopping-and-Cryptocurrency-Apps-ehn.shtml

  • https://securityaffairs.com/181217/uncategorized/ermac-3-0-source-code-leak-reveals-expanding-threat.html


  • Published: Sun Aug 17 02:51:35 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us